You need to consider if any other crimes extends your exposure. Vending, buying from DNMs, hacking, fraud, carding, etc. would increase your exposure. And the worst of them all, talking about darknet with friends.
Next consideration is how deeply involved you are, a Dread PR or actually being a moderator in the DNM, etc. will settle the risk taking and potential consequences.
If potential consequences are sewer, you need to consider how you connect to internet, see /post/f12b38fc9337bce6ae34. System wise Qubes/Whonix is a good start, make sure the computer is secured meaning that WiFi-chip, loudspeakers, microphone and Webcam is removed. Coreboot firmware would be good too. Only connect with a Ethernet cable. Don't mix private devices with your darknet toolbox.
Then timing attacks, you need to consider your PR management work hours versus your internet sessions. Best is to let your internet connection do some automated activities via Tor to obscure working hours and this together with manually connecting to your PR work from free WiFi occasionally.
Never vended but made purchases in the past
Never did fraud
Just doing Dread PR work for a vendor not a market
I do not imagine my threat model being very high but the products we sell are on the more extreme side not thc
make sure the computer is secured meaning that WiFi-chip, loudspeakers, microphone and Webcam is removed. Coreboot firmware would be good too.
Could you point in my to a resource on how I could this? Or is this just a simple youtube;google search?
Best is to let your internet connection do some automated activities via Tor to obscure working hours and this together with manually connecting to your PR work from free WiFi occasionally.
What is the best way to set that up?
If you are more comfortable answering in dms please do so
I want to improve my OPSEC as best as possible
Next consideration is how deeply involved you are, a Dread PR or actually being a moderator in the DNM, etc. will settle the risk taking and potential consequences.
If potential consequences are sewer, you need to consider how you connect to internet, see /post/f12b38fc9337bce6ae34. System wise Qubes/Whonix is a good start, make sure the computer is secured meaning that WiFi-chip, loudspeakers, microphone and Webcam is removed. Coreboot firmware would be good too. Only connect with a Ethernet cable. Don't mix private devices with your darknet toolbox.
Then timing attacks, you need to consider your PR management work hours versus your internet sessions. Best is to let your internet connection do some automated activities via Tor to obscure working hours and this together with manually connecting to your PR work from free WiFi occasionally.
Never vended but made purchases in the past
Never did fraud
Just doing Dread PR work for a vendor not a market
I do not imagine my threat model being very high but the products we sell are on the more extreme side not thc
Could you point in my to a resource on how I could this? Or is this just a simple youtube;google search?
What is the best way to set that up?
If you are more comfortable answering in dms please do so
I want to improve my OPSEC as best as possible